* [dts] [PATCH V2 0/2] Ipgre automation testing script @ 2016-07-26 5:45 Yufen Mo 2016-07-26 5:45 ` [dts] [PATCH V2 1/2] add sctp/gre format support in framework/packet module Yufen Mo 2016-07-26 5:45 ` [dts] [PATCH V2 2/2] Ipgre: upload automation testing script Yufen Mo 0 siblings, 2 replies; 5+ messages in thread From: Yufen Mo @ 2016-07-26 5:45 UTC (permalink / raw) To: dts; +Cc: yufengmx From: yufengmx <yufengx.mo@intel.com> yufengmx (2): add sctp/gre format support in framework/packet module Ipgre: upload automation testing script framework/packet.py | 19 +++ test_plans/ipgre_test_plan.rst | 181 +++++++++++++++++++++++++ tests/TestSuite_ipgre.py | 295 +++++++++++++++++++++++++++++++++++++++++ 3 files changed, 495 insertions(+) create mode 100644 test_plans/ipgre_test_plan.rst create mode 100644 tests/TestSuite_ipgre.py -- 1.9.3 ^ permalink raw reply [flat|nested] 5+ messages in thread
* [dts] [PATCH V2 1/2] add sctp/gre format support in framework/packet module 2016-07-26 5:45 [dts] [PATCH V2 0/2] Ipgre automation testing script Yufen Mo @ 2016-07-26 5:45 ` Yufen Mo 2016-07-26 5:45 ` [dts] [PATCH V2 2/2] Ipgre: upload automation testing script Yufen Mo 1 sibling, 0 replies; 5+ messages in thread From: Yufen Mo @ 2016-07-26 5:45 UTC (permalink / raw) To: dts; +Cc: yufengmx From: yufengmx <yufengx.mo@intel.com> Signed-off-by: yufengmx <yufengx.mo@intel.com> --- framework/packet.py | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) diff --git a/framework/packet.py b/framework/packet.py index a46fd47..30f3b4a 100755 --- a/framework/packet.py +++ b/framework/packet.py @@ -255,12 +255,24 @@ class scapy(object): if chksum is not None: pkt_layer.chksum = chksum + def sctp(self, src=53, dst=53, len=None, chksum=None): + self.pkt[SCTP].sport = src + self.pkt[SCTP].dport = dst + if len is not None: + self.pkt[SCTP].len = len + if chksum is not None: + self.pkt[SCTP].chksum = chksum + def raw(self, pkt_layer, payload=None): if payload is not None: pkt_layer.load = '' for hex1, hex2 in payload: pkt_layer.load += struct.pack("=B", int('%s%s' %(hex1, hex2), 16)) + def gre(self, proto=None): + if proto is not None: + self.pkt[GRE].proto = proto + def vxlan(self, pkt_layer, vni=0): pkt_layer.vni = vni @@ -450,6 +462,7 @@ class Packet(object): 'IPihl': 'ipv4ihl', 'IPFRAG': 'ipv4_ext', 'IPv6': 'ipv6', + 'IPv6-TUNNEL':'inner_ipv6', 'IPv6FRAG': 'ipv6_frag', 'IPv6EXT': 'ipv6_ext', 'IPv6EXT2': 'ipv6_ext2', @@ -565,6 +578,12 @@ class Packet(object): def _config_layer_tcp(self, pkt_layer, config): return self.pktgen.tcp(pkt_layer, **config) + def _config_layer_sctp(self, pkt_layer, config): + return self.pktgen.sctp(**config) + + def _config_layer_gre(self, pkt_layer, config): + return self.pktgen.gre(**config) + def _config_layer_raw(self, pkt_layer, config): return self.pktgen.raw(pkt_layer, **config) -- 1.9.3 ^ permalink raw reply [flat|nested] 5+ messages in thread
* [dts] [PATCH V2 2/2] Ipgre: upload automation testing script 2016-07-26 5:45 [dts] [PATCH V2 0/2] Ipgre automation testing script Yufen Mo 2016-07-26 5:45 ` [dts] [PATCH V2 1/2] add sctp/gre format support in framework/packet module Yufen Mo @ 2016-07-26 5:45 ` Yufen Mo 2016-07-26 8:28 ` Liu, Yong 1 sibling, 1 reply; 5+ messages in thread From: Yufen Mo @ 2016-07-26 5:45 UTC (permalink / raw) To: dts; +Cc: yufengmx From: yufengmx <yufengx.mo@intel.com> Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network. Fortville support GRE packet detecting, checksum computing and filtering. Signed-off-by: yufengmx <yufengx.mo@intel.com> --- test_plans/ipgre_test_plan.rst | 181 +++++++++++++++++++++++++ tests/TestSuite_ipgre.py | 295 +++++++++++++++++++++++++++++++++++++++++ 2 files changed, 476 insertions(+) create mode 100644 test_plans/ipgre_test_plan.rst create mode 100644 tests/TestSuite_ipgre.py diff --git a/test_plans/ipgre_test_plan.rst b/test_plans/ipgre_test_plan.rst new file mode 100644 index 0000000..444efdf --- /dev/null +++ b/test_plans/ipgre_test_plan.rst @@ -0,0 +1,181 @@ +.. Copyright(c) 2010-2016 Intel Corporation + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + - Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + - Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the + distribution. + + - Neither the name of Intel Corporation nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + + +==================== +Generic Routing Encapsulation (GRE) +==================== + +Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network. +Fortville support GRE packet detecting, checksum computing and filtering. + +Prerequisites +------------- + +Fortville nic should be on the DUT. + +Test cases +---------- + +Test Case 1: GRE ipv4 packet detect +================================= +Start testpmd and enable rxonly forwarding mode:: + testpmd -c ffff -n 4 -- -i --txqflags=0x0 + testpmd> set fwd rxonly + testpmd> set verbose 1 + testpmd> start + +Send packet as table listed and packet type match each layer. + ++------------+----------+-----------+----------+-----------+ +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 | ++------------+----------+-----------+----------+-----------+ +| No | Ipv4 | GRE | Ipv4 | Udp | ++------------+----------+-----------+----------+-----------+ +| No | Ipv4 | GRE | Ipv4 | Tcp | ++------------+----------+-----------+----------+-----------+ +| No | Ipv4 | GRE | Ipv4 | Sctp | ++------------+----------+-----------+----------+-----------+ +| Yes | Ipv4 | GRE | Ipv4 | Udp | ++------------+----------+-----------+----------+-----------+ +| Yes | Ipv4 | GRE | Ipv4 | Tcp | ++------------+----------+-----------+----------+-----------+ +| Yes | Ipv4 | GRE | Ipv4 | Sctp | ++------------+----------+-----------+----------+-----------+ + + +Test Case 2: GRE ipv6 packet detect +================================= +Start testpmd and enable rxonly forwarding mode:: + testpmd -c ffff -n 4 -- -i --txqflags=0x0 + testpmd> set fwd rxonly + testpmd> set verbose 1 + testpmd> start + +Send packet as table listed and packet type match each layer. +Ether()/IPv6(nh=47)/GRE()/IP()/UDP()/Raw('x'*40) +Ether()/IPv6(nh=47)/GRE(proto=0x86dd)/IPv6()/UDP()/Raw('x'*40) ++------------+----------+-----------+----------+-----------+ +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 | ++------------+----------+-----------+----------+-----------+ +| No | Ipv6 | GRE | Ipv4 | Udp | ++------------+----------+-----------+----------+-----------+ +| No | Ipv6 | GRE | Ipv4 | Tcp | ++------------+----------+-----------+----------+-----------+ +| No | Ipv6 | GRE | Ipv4 | Sctp | ++------------+----------+-----------+----------+-----------+ +| Yes | Ipv6 | GRE | Ipv4 | Udp | ++------------+----------+-----------+----------+-----------+ +| Yes | Ipv6 | GRE | Ipv4 | Tcp | ++------------+----------+-----------+----------+-----------+ +| Yes | Ipv6 | GRE | Ipv4 | Sctp | ++------------+----------+-----------+----------+-----------+ + ++------------+----------+-----------+----------+-----------+ +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 | ++------------+----------+-----------+----------+-----------+ +| No | Ipv6 | GRE | Ipv6 | Udp | ++------------+----------+-----------+----------+-----------+ +| No | Ipv6 | GRE | Ipv6 | Tcp | ++------------+----------+-----------+----------+-----------+ +| No | Ipv6 | GRE | Ipv6 | Sctp | ++------------+----------+-----------+----------+-----------+ +| Yes | Ipv6 | GRE | Ipv6 | Udp | ++------------+----------+-----------+----------+-----------+ +| Yes | Ipv6 | GRE | Ipv6 | Tcp | ++------------+----------+-----------+----------+-----------+ +| Yes | Ipv6 | GRE | Ipv6 | Sctp | ++------------+----------+-----------+----------+-----------+ + +Test Case 3: GRE packet filter +============================ +Start testpmd with multi queues:: + testpmd -c ff -n 3 -- -i --rxq=4 --txq=4 --txqflags=0x0 + testpmd> set fwd rxonly + testpmd> set nbcore 4 + testpmd> set verbose 1 + testpmd> start + +Add GRE filter that forward inner ip address 0.0.0.0 to queue 3 + testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ + 0.0.0.0 1 ipingre iip 0 3 + +Send packet inner ip address matched and check packet recevied by queue 3. + p = Ether()/IP()/GRE()/IP(dst="0.0.0.0")/UDP() + +Remove tunnel filter and check same packet recevied by queue 0 + testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ + 0.0.0.0 1 ipingre iip 0 3 + +Add GRE filter that forward outer ip address 0.0.0.0 to queue 3 + testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ + 0.0.0.0 1 ipingre oip 0 3 + +Send packet outer ip address matched and check packet recevied by queue 3. + +Remove tunnel filter and check same packet recevied by queue 0. + testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ + 0.0.0.0 1 ipingre iip 0 3 + +Test Case 4: GRE packet chksum offload +==================================== +Start testpmd with hardware checksum offload enabled:: + testpmd -c ff -n 3 -- -i --txqflags=0x0 --enable-rx-cksum --port-topology=loop + testpmd> set verbose 1 + testpmd> set fwd csum + testpmd> csum set ip hw 0 + testpmd> csum set udp hw 0 + testpmd> csum set sctp hw 0 + testpmd> csum set outer-ip hw 0 + testpmd> csum set tcp hw 0 + testpmd> csum parse_tunnel on 0 + testpmd> start + +Send packet with wrong outer IP checksum and check forwarded packet IP +checksum is correct. + Ether()/IP(chksum=0x0)/GRE()/IP()/TCP() + +Send packet with wrong inner IP checksum and check forwarded packet IP +checksum is correct. + Ether()/IP()/GRE()/IP(chksum=0x0)/TCP() + +Send packet with wrong inner TCP checksum and check forwarded packet TCP +checksum is correct. + Ether()/IP()/GRE()/IP()/TCP(chksum=0x0) + +Send packet with wrong inner UDP checksum and check forwarded packet UDP +checksum is correct. + Ether()/IP()/GRE()/IP()/UDP(chksum=0xffff) + +Send packet with wrong inner SCTP checksum and check forwarded packet SCTP +checksum is correct. + Ether()/IP()/GRE()/IP()/SCTP(chksum=0x0) diff --git a/tests/TestSuite_ipgre.py b/tests/TestSuite_ipgre.py new file mode 100644 index 0000000..a628f59 --- /dev/null +++ b/tests/TestSuite_ipgre.py @@ -0,0 +1,295 @@ +# BSD LICENSE +# +# Copyright(c) 2010-2014 Intel Corporation. All rights reserved. +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without +# modification, are permitted provided that the following conditions +# are met: +# +# * Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# * Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in +# the documentation and/or other materials provided with the +# distribution. +# * Neither the name of Intel Corporation nor the names of its +# contributors may be used to endorse or promote products derived +# from this software without specific prior written permission. +# +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +""" +DPDK Test suite. + +Generic Routing Encapsulation (GRE) is a tunneling protocol developed by +Cisco Systems that can encapsulate a wide variety of network layer protocols +inside virtual point-to-point links over an Internet Protocol network. + +Fortville support GRE packet detecting, checksum computing and filtering. +""" + +import time +import os + +import dts +from test_case import TestCase +from exception import VerifyFailure +from packet import Packet + +class TestIpgre(TestCase): + + def set_up_all(self): + """ + Run at the start of each test suite. + """ + self.printFlag = dts.debug_mode + self.src_mac = "11:22:33:44:55:66" + ports = self.dut.get_ports() + self.verify(self.nic.startswith("fortville"), + "GRE tunnel packet type only support by Fortville") + self.verify(len(ports) >= 1, "Insufficient ports for testing") + valports = [_ for _ in ports if self.tester.get_local_port(_) != -1] + # start testpmd + self.dut_port = valports[0] + tester_port = self.tester.get_local_port(self.dut_port) + self.tester_iface = self.tester.get_interface(tester_port) + self.tester_iface_mac = self.tester.get_mac(tester_port) + + def set_up(self): + """ + Run before each test case. + Nothing to do. + """ + pass + + def check_packet_transmission(self, pkt_types, layer_configs=None): + time.sleep(1) + for pkt_type in pkt_types.keys(): + pkt_names = pkt_types[pkt_type] + pkt = Packet(pkt_type=pkt_type) + if layer_configs: + for layer in layer_configs.keys(): + pkt.config_layer(layer, layer_configs[layer]) + pkt.send_pkt(tx_port=self.tester_iface) + out = self.dut.get_session_output(timeout=2) + if self.printFlag: # debug output + print out + for pkt_layer_name in pkt_names: + if self.printFlag:# debug output + print pkt_layer_name + if pkt_layer_name not in out: + print dts.RED("Fail to detect %s" % pkt_layer_name) + if not self.printFlag: + raise VerifyFailure("Failed to detect %s" % pkt_layer_name) + else: + print dts.GREEN("Detected %s successfully" % pkt_type) + time.sleep(1) + + def test_GRE_ipv4_packet_detect(self): + """ + Start testpmd and enable rxonly forwarding mode + Send packet as table listed and packet type match each layer + """ + pkt_types = { + "MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"], + "MAC_IP_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP"], + "MAC_IP_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP"], + "MAC_VLAN_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"], + "MAC_VLAN_IP_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP"], + "MAC_VLAN_IP_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP"] + } + config_layers = {'ether': {'src': self.src_mac}, + 'ipv4': {'proto': 'gre'}} + # Start testpmd and enable rxonly forwarding mode + testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx-cksum --enable-rx-cksum" % self.target + self.dut.send_expect( testpmd_cmd, + "testpmd>", + 20) + self.dut.send_expect("set fwd rxonly", "testpmd>") + self.dut.send_expect("set verbose 1", "testpmd>") + self.dut.send_expect("start", "testpmd>") + + self.check_packet_transmission(pkt_types, config_layers) + + self.dut.send_expect("quit", "#") + + def test_GRE_ipv6_packet_detect(self): + """ + Start testpmd and enable rxonly forwarding mode + Send packet as table listed and packet type match each layer + """ + pkt_types_ipv6_ip = { + "MAC_IPv6_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"], + "MAC_IPv6_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP"], + "MAC_IPv6_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP"], + "MAC_VLAN_IPv6_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"], + "MAC_VLAN_IPv6_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"], + "MAC_VLAN_IPv6_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"] + } + + pkt_types_ipv6_ipv6 = { + "MAC_IPv6_GRE_IPv6_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"], + "MAC_IPv6_GRE_IPv6_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP"], + "MAC_VLAN_IPv6_GRE_IPv6_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"], + "MAC_VLAN_IPv6_GRE_IPv6_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"] + } + + pkt_types_ipv6_ipv6_SCTP = { + "MAC_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP"], + "MAC_VLAN_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"] + } + + # Start testpmd and enable rxonly forwarding mode + testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx-cksum" % self.target + self.dut.send_expect(testpmd_cmd, "testpmd>", 20) + self.dut.send_expect("set fwd rxonly", "testpmd>") + self.dut.send_expect("set verbose 1", "testpmd>") + self.dut.send_expect("start", "testpmd>") + + # inner ipv4 + config_layers = {'ether': {'src': self.src_mac}, + 'ipv6': {'nh': 47}, + 'raw': {'payload':['78']*40}} + self.check_packet_transmission(pkt_types_ipv6_ip, config_layers) + + # inner ipv6 + config_layers = {'ether': {'src': self.src_mac}, + 'ipv6': {'nh': 47}, + 'gre': {'proto': 0x86dd}, + 'raw': {'payload':['78']*40}} + self.check_packet_transmission(pkt_types_ipv6_ipv6, config_layers) + + # inner ipv6 SCTP + config_layers = {'ether': {'src': self.src_mac}, + 'ipv6': {'nh': 47}, + 'gre': {'proto': 0x86dd}, + 'inner_ipv6': {'nh': 132}, + 'raw': {'payload':['78']*40}} + self.check_packet_transmission(pkt_types_ipv6_ipv6_SCTP, config_layers) + self.dut.send_expect("quit", "#") + + def test_GRE_packet_filter(self): + """ + Start testpmd with multi queues, add GRE filter that forward + inner/outer ip address 0.0.0.0 to queue 3, Send packet inner + ip address matched and check packet recevied by queue 3 + """ + outer_mac = self.tester_iface_mac + inner_mac = "10:00:00:00:00:00" + + # Start testpmd with multi queues + testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx-cksum --rxq=4 --txq=4" % self.target + self.dut.send_expect(testpmd_cmd, "testpmd>", 20) + self.dut.send_expect("set fwd rxonly", "testpmd>") + self.dut.send_expect("set nbcore 4", "testpmd>") + self.dut.send_expect("set verbose 1", "testpmd>") + self.dut.send_expect("start", "testpmd>") + + # Add GRE filter that forward inner ip address 0.0.0.0 to queue 3 + cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre iip 0 3"%(outer_mac, inner_mac) + self.dut.send_expect( cmd, "testpmd>") + + # Send packet inner ip address matched and check packet recevied by queue 3 + pkt_types = {"MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"]} + config_layers = {'ether': {'src': self.src_mac}, + 'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}} + self.check_packet_transmission(pkt_types, config_layers) + + # Remove tunnel filter and check same packet recevied by queue 0 + cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0 3"%(outer_mac, inner_mac) + self.dut.send_expect( cmd, "testpmd>") + + # Add GRE filter that forward outer ip address 0.0.0.0 to queue 3 + cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre oip 0 3"%(outer_mac, inner_mac) + self.dut.send_expect( cmd, "testpmd>") + + # Send packet outer ip address matched and check packet recevied by queue 3. + pkt_types = {"MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"]} + config_layers = {'ether': {'src': self.src_mac}, + 'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}} + self.check_packet_transmission(pkt_types, config_layers) + + # Add GRE filter that forward outer ip address 0.0.0.0 to queue 3 + cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0 3"%(outer_mac, inner_mac) + self.dut.send_expect( cmd, "testpmd>") + time.sleep(2) + self.dut.send_expect("quit", "#") + + def test_GRE_packet_chksum_offload(self): + """ + Start testpmd with hardware checksum offload enabled, + Send packet with wrong IP/TCP/UDP/SCTP checksum and check forwarded packet checksum + """ + # Start testpmd and enable rxonly forwarding mode + testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx-cksum --txqflags=0x0 --port-topology=loop" % self.target + self.dut.send_expect(testpmd_cmd, "testpmd>", 20) + self.dut.send_expect("set verbose 1", "testpmd>") + self.dut.send_expect("set fwd csum", "testpmd>") + self.dut.send_expect("csum set ip hw 0", "testpmd>") + self.dut.send_expect("csum set udp hw 0", "testpmd>") + self.dut.send_expect("csum set sctp hw 0", "testpmd>") + self.dut.send_expect("csum set outer-ip hw 0", "testpmd>") + self.dut.send_expect("csum set tcp hw 0", "testpmd>") + self.dut.send_expect("csum parse_tunnel on 0", "testpmd>") + self.dut.send_expect("start", "testpmd>") + + # Send packet with wrong outer IP checksum and check forwarded packet IP checksum is correct + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_OUTER_IP_CKSUM"]} + config_layers = {'ether': {'src': self.src_mac}, + 'ipv4': {'chksum': 0x0, 'proto': 'gre'}} + self.check_packet_transmission(pkt_types, config_layers) + + # Send packet with wrong inner IP checksum and check forwarded packet IP checksum is correct + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_IP_CKSUM"]} + config_layers = {'ether': {'src': self.src_mac}, + 'inner_ipv4': {'chksum': 0x0, 'proto': 'gre'}} + self.check_packet_transmission(pkt_types, config_layers) + + # Send packet with wrong inner TCP checksum and check forwarded packet TCP checksum is correct + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_TCP_CKSUM"]} + config_layers = {'ether': {'src': self.src_mac}, + 'tcp': {'chksum': 0x0}, + 'ipv4': {'proto': 'gre'}} + self.check_packet_transmission(pkt_types, config_layers) + + # Send packet with wrong inner UDP checksum and check forwarded packet UDP checksum is correct + pkt_types = { "MAC_IP_GRE_IP_UDP_PKT": ["PKT_TX_UDP_CKSUM"]} + config_layers = {'ether': {'src': self.src_mac}, + 'udp': {'chksum': 0xffff}, + 'ipv4': {'proto': 'gre'}} + self.check_packet_transmission(pkt_types, config_layers) + + # Send packet with wrong inner SCTP checksum and check forwarded packet SCTP checksum is correct + pkt_types = { "MAC_IP_GRE_IP_SCTP_PKT": ["PKT_TX_SCTP_CKSUM"]} + config_layers = {'ether': {'src': self.src_mac}, + 'ipv4': {'proto': 'gre'}, + 'sctp': {'chksum': 0x0}} + self.check_packet_transmission(pkt_types , config_layers) + + self.dut.send_expect("quit", "#") + + def tear_down(self): + """ + Run after each test case. + Nothing to do. + """ + pass + + def tear_down_all(self): + """ + Run after each test suite. + Nothing to do. + """ + self.dut.kill_all() + pass -- 1.9.3 ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [dts] [PATCH V2 2/2] Ipgre: upload automation testing script 2016-07-26 5:45 ` [dts] [PATCH V2 2/2] Ipgre: upload automation testing script Yufen Mo @ 2016-07-26 8:28 ` Liu, Yong 2016-07-27 0:32 ` Liu, Yong 0 siblings, 1 reply; 5+ messages in thread From: Liu, Yong @ 2016-07-26 8:28 UTC (permalink / raw) To: Mo, YufengX, dts; +Cc: Mo, YufengX Thanks Yufen, one question for checksum offload case. In the test plan, checksum offload case only check whether checksum error detected by NIC. For the checksum value, the case not checked whether it's correct. It's different from vxlan/nvgre case, what cause the difference? > -----Original Message----- > From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Yufen Mo > Sent: Tuesday, July 26, 2016 1:45 PM > To: dts@dpdk.org > Cc: Mo, YufengX > Subject: [dts] [PATCH V2 2/2] Ipgre: upload automation testing script > > From: yufengmx <yufengx.mo@intel.com> > > Generic Routing Encapsulation (GRE) is a tunneling protocol developed by > Cisco Systems that can encapsulate > a wide variety of network layer protocols inside virtual point-to-point > links over an Internet Protocol network. > Fortville support GRE packet detecting, checksum computing and filtering. > > Signed-off-by: yufengmx <yufengx.mo@intel.com> > --- > test_plans/ipgre_test_plan.rst | 181 +++++++++++++++++++++++++ > tests/TestSuite_ipgre.py | 295 > +++++++++++++++++++++++++++++++++++++++++ > 2 files changed, 476 insertions(+) > create mode 100644 test_plans/ipgre_test_plan.rst > create mode 100644 tests/TestSuite_ipgre.py > > diff --git a/test_plans/ipgre_test_plan.rst > b/test_plans/ipgre_test_plan.rst > new file mode 100644 > index 0000000..444efdf > --- /dev/null > +++ b/test_plans/ipgre_test_plan.rst > @@ -0,0 +1,181 @@ > +.. Copyright(c) 2010-2016 Intel Corporation > + All rights reserved. > + > + Redistribution and use in source and binary forms, with or without > + modification, are permitted provided that the following conditions > + are met: > + > + - Redistributions of source code must retain the above copyright > + notice, this list of conditions and the following disclaimer. > + > + - Redistributions in binary form must reproduce the above copyright > + notice, this list of conditions and the following disclaimer in > + the documentation and/or other materials provided with the > + distribution. > + > + - Neither the name of Intel Corporation nor the names of its > + contributors may be used to endorse or promote products derived > + from this software without specific prior written permission. > + > + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS > + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT > + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS > + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE > + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, > + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES > + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR > + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) > + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, > + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) > + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED > + OF THE POSSIBILITY OF SUCH DAMAGE. > + > + > +==================== > +Generic Routing Encapsulation (GRE) > +==================== > + > +Generic Routing Encapsulation (GRE) is a tunneling protocol developed by > Cisco Systems that can encapsulate a wide variety of network layer > protocols inside virtual point-to-point links over an Internet Protocol > network. > +Fortville support GRE packet detecting, checksum computing and filtering. > + > +Prerequisites > +------------- > + > +Fortville nic should be on the DUT. > + > +Test cases > +---------- > + > +Test Case 1: GRE ipv4 packet detect > +================================= > +Start testpmd and enable rxonly forwarding mode:: > + testpmd -c ffff -n 4 -- -i --txqflags=0x0 > + testpmd> set fwd rxonly > + testpmd> set verbose 1 > + testpmd> start > + > +Send packet as table listed and packet type match each layer. > + > ++------------+----------+-----------+----------+-----------+ > +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 | > ++------------+----------+-----------+----------+-----------+ > +| No | Ipv4 | GRE | Ipv4 | Udp | > ++------------+----------+-----------+----------+-----------+ > +| No | Ipv4 | GRE | Ipv4 | Tcp | > ++------------+----------+-----------+----------+-----------+ > +| No | Ipv4 | GRE | Ipv4 | Sctp | > ++------------+----------+-----------+----------+-----------+ > +| Yes | Ipv4 | GRE | Ipv4 | Udp | > ++------------+----------+-----------+----------+-----------+ > +| Yes | Ipv4 | GRE | Ipv4 | Tcp | > ++------------+----------+-----------+----------+-----------+ > +| Yes | Ipv4 | GRE | Ipv4 | Sctp | > ++------------+----------+-----------+----------+-----------+ > + > + > +Test Case 2: GRE ipv6 packet detect > +================================= > +Start testpmd and enable rxonly forwarding mode:: > + testpmd -c ffff -n 4 -- -i --txqflags=0x0 > + testpmd> set fwd rxonly > + testpmd> set verbose 1 > + testpmd> start > + > +Send packet as table listed and packet type match each layer. > +Ether()/IPv6(nh=47)/GRE()/IP()/UDP()/Raw('x'*40) > +Ether()/IPv6(nh=47)/GRE(proto=0x86dd)/IPv6()/UDP()/Raw('x'*40) > ++------------+----------+-----------+----------+-----------+ > +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 | > ++------------+----------+-----------+----------+-----------+ > +| No | Ipv6 | GRE | Ipv4 | Udp | > ++------------+----------+-----------+----------+-----------+ > +| No | Ipv6 | GRE | Ipv4 | Tcp | > ++------------+----------+-----------+----------+-----------+ > +| No | Ipv6 | GRE | Ipv4 | Sctp | > ++------------+----------+-----------+----------+-----------+ > +| Yes | Ipv6 | GRE | Ipv4 | Udp | > ++------------+----------+-----------+----------+-----------+ > +| Yes | Ipv6 | GRE | Ipv4 | Tcp | > ++------------+----------+-----------+----------+-----------+ > +| Yes | Ipv6 | GRE | Ipv4 | Sctp | > ++------------+----------+-----------+----------+-----------+ > + > ++------------+----------+-----------+----------+-----------+ > +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 | > ++------------+----------+-----------+----------+-----------+ > +| No | Ipv6 | GRE | Ipv6 | Udp | > ++------------+----------+-----------+----------+-----------+ > +| No | Ipv6 | GRE | Ipv6 | Tcp | > ++------------+----------+-----------+----------+-----------+ > +| No | Ipv6 | GRE | Ipv6 | Sctp | > ++------------+----------+-----------+----------+-----------+ > +| Yes | Ipv6 | GRE | Ipv6 | Udp | > ++------------+----------+-----------+----------+-----------+ > +| Yes | Ipv6 | GRE | Ipv6 | Tcp | > ++------------+----------+-----------+----------+-----------+ > +| Yes | Ipv6 | GRE | Ipv6 | Sctp | > ++------------+----------+-----------+----------+-----------+ > + > +Test Case 3: GRE packet filter > +============================ > +Start testpmd with multi queues:: > + testpmd -c ff -n 3 -- -i --rxq=4 --txq=4 --txqflags=0x0 > + testpmd> set fwd rxonly > + testpmd> set nbcore 4 > + testpmd> set verbose 1 > + testpmd> start > + > +Add GRE filter that forward inner ip address 0.0.0.0 to queue 3 > + testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ > + 0.0.0.0 1 ipingre iip 0 3 > + > +Send packet inner ip address matched and check packet recevied by queue 3. > + p = Ether()/IP()/GRE()/IP(dst="0.0.0.0")/UDP() > + > +Remove tunnel filter and check same packet recevied by queue 0 > + testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ > + 0.0.0.0 1 ipingre iip 0 3 > + > +Add GRE filter that forward outer ip address 0.0.0.0 to queue 3 > + testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ > + 0.0.0.0 1 ipingre oip 0 3 > + > +Send packet outer ip address matched and check packet recevied by queue 3. > + > +Remove tunnel filter and check same packet recevied by queue 0. > + testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ > + 0.0.0.0 1 ipingre iip 0 3 > + > +Test Case 4: GRE packet chksum offload > +==================================== > +Start testpmd with hardware checksum offload enabled:: > + testpmd -c ff -n 3 -- -i --txqflags=0x0 --enable-rx-cksum --port- > topology=loop > + testpmd> set verbose 1 > + testpmd> set fwd csum > + testpmd> csum set ip hw 0 > + testpmd> csum set udp hw 0 > + testpmd> csum set sctp hw 0 > + testpmd> csum set outer-ip hw 0 > + testpmd> csum set tcp hw 0 > + testpmd> csum parse_tunnel on 0 > + testpmd> start > + > +Send packet with wrong outer IP checksum and check forwarded packet IP > +checksum is correct. > + Ether()/IP(chksum=0x0)/GRE()/IP()/TCP() > + > +Send packet with wrong inner IP checksum and check forwarded packet IP > +checksum is correct. > + Ether()/IP()/GRE()/IP(chksum=0x0)/TCP() > + > +Send packet with wrong inner TCP checksum and check forwarded packet TCP > +checksum is correct. > + Ether()/IP()/GRE()/IP()/TCP(chksum=0x0) > + > +Send packet with wrong inner UDP checksum and check forwarded packet UDP > +checksum is correct. > + Ether()/IP()/GRE()/IP()/UDP(chksum=0xffff) > + > +Send packet with wrong inner SCTP checksum and check forwarded packet > SCTP > +checksum is correct. > + Ether()/IP()/GRE()/IP()/SCTP(chksum=0x0) > diff --git a/tests/TestSuite_ipgre.py b/tests/TestSuite_ipgre.py > new file mode 100644 > index 0000000..a628f59 > --- /dev/null > +++ b/tests/TestSuite_ipgre.py > @@ -0,0 +1,295 @@ > +# BSD LICENSE > +# > +# Copyright(c) 2010-2014 Intel Corporation. All rights reserved. > +# All rights reserved. > +# > +# Redistribution and use in source and binary forms, with or without > +# modification, are permitted provided that the following conditions > +# are met: > +# > +# * Redistributions of source code must retain the above copyright > +# notice, this list of conditions and the following disclaimer. > +# * Redistributions in binary form must reproduce the above copyright > +# notice, this list of conditions and the following disclaimer in > +# the documentation and/or other materials provided with the > +# distribution. > +# * Neither the name of Intel Corporation nor the names of its > +# contributors may be used to endorse or promote products derived > +# from this software without specific prior written permission. > +# > +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS > +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT > +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR > +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT > +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, > +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT > +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, > +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY > +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT > +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE > +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. > + > +""" > +DPDK Test suite. > + > +Generic Routing Encapsulation (GRE) is a tunneling protocol developed by > +Cisco Systems that can encapsulate a wide variety of network layer > protocols > +inside virtual point-to-point links over an Internet Protocol network. > + > +Fortville support GRE packet detecting, checksum computing and filtering. > +""" > + > +import time > +import os > + > +import dts > +from test_case import TestCase > +from exception import VerifyFailure > +from packet import Packet > + > +class TestIpgre(TestCase): > + > + def set_up_all(self): > + """ > + Run at the start of each test suite. > + """ > + self.printFlag = dts.debug_mode > + self.src_mac = "11:22:33:44:55:66" > + ports = self.dut.get_ports() > + self.verify(self.nic.startswith("fortville"), > + "GRE tunnel packet type only support by Fortville") > + self.verify(len(ports) >= 1, "Insufficient ports for testing") > + valports = [_ for _ in ports if self.tester.get_local_port(_) != > -1] > + # start testpmd > + self.dut_port = valports[0] > + tester_port = self.tester.get_local_port(self.dut_port) > + self.tester_iface = self.tester.get_interface(tester_port) > + self.tester_iface_mac = self.tester.get_mac(tester_port) > + > + def set_up(self): > + """ > + Run before each test case. > + Nothing to do. > + """ > + pass > + > + def check_packet_transmission(self, pkt_types, layer_configs=None): > + time.sleep(1) > + for pkt_type in pkt_types.keys(): > + pkt_names = pkt_types[pkt_type] > + pkt = Packet(pkt_type=pkt_type) > + if layer_configs: > + for layer in layer_configs.keys(): > + pkt.config_layer(layer, layer_configs[layer]) > + pkt.send_pkt(tx_port=self.tester_iface) > + out = self.dut.get_session_output(timeout=2) > + if self.printFlag: # debug output > + print out > + for pkt_layer_name in pkt_names: > + if self.printFlag:# debug output > + print pkt_layer_name > + if pkt_layer_name not in out: > + print dts.RED("Fail to detect %s" % pkt_layer_name) > + if not self.printFlag: > + raise VerifyFailure("Failed to detect %s" % > pkt_layer_name) > + else: > + print dts.GREEN("Detected %s successfully" % pkt_type) > + time.sleep(1) > + > + def test_GRE_ipv4_packet_detect(self): > + """ > + Start testpmd and enable rxonly forwarding mode > + Send packet as table listed and packet type match each layer > + """ > + pkt_types = { > + "MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: UDP"], > + "MAC_IP_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: TCP"], > + "MAC_IP_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: SCTP"], > + "MAC_VLAN_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: UDP"], > + "MAC_VLAN_IP_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: TCP"], > + "MAC_VLAN_IP_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: SCTP"] > + } > + config_layers = {'ether': {'src': self.src_mac}, > + 'ipv4': {'proto': 'gre'}} > + # Start testpmd and enable rxonly forwarding mode > + testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx- > cksum --enable-rx-cksum" % self.target > + self.dut.send_expect( testpmd_cmd, > + "testpmd>", > + 20) > + self.dut.send_expect("set fwd rxonly", "testpmd>") > + self.dut.send_expect("set verbose 1", "testpmd>") > + self.dut.send_expect("start", "testpmd>") > + > + self.check_packet_transmission(pkt_types, config_layers) > + > + self.dut.send_expect("quit", "#") > + > + def test_GRE_ipv6_packet_detect(self): > + """ > + Start testpmd and enable rxonly forwarding mode > + Send packet as table listed and packet type match each layer > + """ > + pkt_types_ipv6_ip = { > + "MAC_IPv6_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: UDP"], > + "MAC_IPv6_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: TCP"], > + "MAC_IPv6_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: SCTP"], > + "MAC_VLAN_IPv6_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"], > + "MAC_VLAN_IPv6_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"], > + "MAC_VLAN_IPv6_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"] > + } > + > + pkt_types_ipv6_ipv6 = { > + "MAC_IPv6_GRE_IPv6_UDP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: UDP"], > + "MAC_IPv6_GRE_IPv6_TCP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: TCP"], > + "MAC_VLAN_IPv6_GRE_IPv6_UDP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"], > + "MAC_VLAN_IPv6_GRE_IPv6_TCP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"] > + } > + > + pkt_types_ipv6_ipv6_SCTP = { > + "MAC_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT": ["Tunnel type: > GRENAT", "Inner L4 type: SCTP"], > + "MAC_VLAN_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT": ["Tunnel type: > GRENAT", "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"] > + } > + > + # Start testpmd and enable rxonly forwarding mode > + testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx- > cksum" % self.target > + self.dut.send_expect(testpmd_cmd, "testpmd>", 20) > + self.dut.send_expect("set fwd rxonly", "testpmd>") > + self.dut.send_expect("set verbose 1", "testpmd>") > + self.dut.send_expect("start", "testpmd>") > + > + # inner ipv4 > + config_layers = {'ether': {'src': self.src_mac}, > + 'ipv6': {'nh': 47}, > + 'raw': {'payload':['78']*40}} > + self.check_packet_transmission(pkt_types_ipv6_ip, config_layers) > + > + # inner ipv6 > + config_layers = {'ether': {'src': self.src_mac}, > + 'ipv6': {'nh': 47}, > + 'gre': {'proto': 0x86dd}, > + 'raw': {'payload':['78']*40}} > + self.check_packet_transmission(pkt_types_ipv6_ipv6, config_layers) > + > + # inner ipv6 SCTP > + config_layers = {'ether': {'src': self.src_mac}, > + 'ipv6': {'nh': 47}, > + 'gre': {'proto': 0x86dd}, > + 'inner_ipv6': {'nh': 132}, > + 'raw': {'payload':['78']*40}} > + self.check_packet_transmission(pkt_types_ipv6_ipv6_SCTP, > config_layers) > + self.dut.send_expect("quit", "#") > + > + def test_GRE_packet_filter(self): > + """ > + Start testpmd with multi queues, add GRE filter that forward > + inner/outer ip address 0.0.0.0 to queue 3, Send packet inner > + ip address matched and check packet recevied by queue 3 > + """ > + outer_mac = self.tester_iface_mac > + inner_mac = "10:00:00:00:00:00" > + > + # Start testpmd with multi queues > + testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx- > cksum --rxq=4 --txq=4" % self.target > + self.dut.send_expect(testpmd_cmd, "testpmd>", 20) > + self.dut.send_expect("set fwd rxonly", "testpmd>") > + self.dut.send_expect("set nbcore 4", "testpmd>") > + self.dut.send_expect("set verbose 1", "testpmd>") > + self.dut.send_expect("start", "testpmd>") > + > + # Add GRE filter that forward inner ip address 0.0.0.0 to queue 3 > + cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre iip 0 > 3"%(outer_mac, inner_mac) > + self.dut.send_expect( cmd, "testpmd>") > + > + # Send packet inner ip address matched and check packet recevied > by queue 3 > + pkt_types = {"MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: UDP"]} > + config_layers = {'ether': {'src': self.src_mac}, > + 'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}} > + self.check_packet_transmission(pkt_types, config_layers) > + > + # Remove tunnel filter and check same packet recevied by queue 0 > + cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0 > 3"%(outer_mac, inner_mac) > + self.dut.send_expect( cmd, "testpmd>") > + > + # Add GRE filter that forward outer ip address 0.0.0.0 to queue 3 > + cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre oip 0 > 3"%(outer_mac, inner_mac) > + self.dut.send_expect( cmd, "testpmd>") > + > + # Send packet outer ip address matched and check packet recevied > by queue 3. > + pkt_types = {"MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > "Inner L4 type: UDP"]} > + config_layers = {'ether': {'src': self.src_mac}, > + 'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}} > + self.check_packet_transmission(pkt_types, config_layers) > + > + # Add GRE filter that forward outer ip address 0.0.0.0 to queue 3 > + cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0 > 3"%(outer_mac, inner_mac) > + self.dut.send_expect( cmd, "testpmd>") > + time.sleep(2) > + self.dut.send_expect("quit", "#") > + > + def test_GRE_packet_chksum_offload(self): > + """ > + Start testpmd with hardware checksum offload enabled, > + Send packet with wrong IP/TCP/UDP/SCTP checksum and check > forwarded packet checksum > + """ > + # Start testpmd and enable rxonly forwarding mode > + testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx- > cksum --txqflags=0x0 --port-topology=loop" % self.target > + self.dut.send_expect(testpmd_cmd, "testpmd>", 20) > + self.dut.send_expect("set verbose 1", "testpmd>") > + self.dut.send_expect("set fwd csum", "testpmd>") > + self.dut.send_expect("csum set ip hw 0", "testpmd>") > + self.dut.send_expect("csum set udp hw 0", "testpmd>") > + self.dut.send_expect("csum set sctp hw 0", "testpmd>") > + self.dut.send_expect("csum set outer-ip hw 0", "testpmd>") > + self.dut.send_expect("csum set tcp hw 0", "testpmd>") > + self.dut.send_expect("csum parse_tunnel on 0", "testpmd>") > + self.dut.send_expect("start", "testpmd>") > + > + # Send packet with wrong outer IP checksum and check forwarded > packet IP checksum is correct > + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_OUTER_IP_CKSUM"]} > + config_layers = {'ether': {'src': self.src_mac}, > + 'ipv4': {'chksum': 0x0, 'proto': 'gre'}} > + self.check_packet_transmission(pkt_types, config_layers) > + > + # Send packet with wrong inner IP checksum and check forwarded > packet IP checksum is correct > + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_IP_CKSUM"]} > + config_layers = {'ether': {'src': self.src_mac}, > + 'inner_ipv4': {'chksum': 0x0, 'proto': 'gre'}} > + self.check_packet_transmission(pkt_types, config_layers) > + > + # Send packet with wrong inner TCP checksum and check forwarded > packet TCP checksum is correct > + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_TCP_CKSUM"]} > + config_layers = {'ether': {'src': self.src_mac}, > + 'tcp': {'chksum': 0x0}, > + 'ipv4': {'proto': 'gre'}} > + self.check_packet_transmission(pkt_types, config_layers) > + > + # Send packet with wrong inner UDP checksum and check forwarded > packet UDP checksum is correct > + pkt_types = { "MAC_IP_GRE_IP_UDP_PKT": ["PKT_TX_UDP_CKSUM"]} > + config_layers = {'ether': {'src': self.src_mac}, > + 'udp': {'chksum': 0xffff}, > + 'ipv4': {'proto': 'gre'}} > + self.check_packet_transmission(pkt_types, config_layers) > + > + # Send packet with wrong inner SCTP checksum and check forwarded > packet SCTP checksum is correct > + pkt_types = { "MAC_IP_GRE_IP_SCTP_PKT": ["PKT_TX_SCTP_CKSUM"]} > + config_layers = {'ether': {'src': self.src_mac}, > + 'ipv4': {'proto': 'gre'}, > + 'sctp': {'chksum': 0x0}} > + self.check_packet_transmission(pkt_types , config_layers) > + > + self.dut.send_expect("quit", "#") > + > + def tear_down(self): > + """ > + Run after each test case. > + Nothing to do. > + """ > + pass > + > + def tear_down_all(self): > + """ > + Run after each test suite. > + Nothing to do. > + """ > + self.dut.kill_all() > + pass > -- > 1.9.3 ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [dts] [PATCH V2 2/2] Ipgre: upload automation testing script 2016-07-26 8:28 ` Liu, Yong @ 2016-07-27 0:32 ` Liu, Yong 0 siblings, 0 replies; 5+ messages in thread From: Liu, Yong @ 2016-07-27 0:32 UTC (permalink / raw) To: Liu, Yong, Mo, YufengX, dts; +Cc: Mo, YufengX Hi Yufen, To calculate the checksum value, scapy can help on that. The first step is to set chksum to None. Then call do_build function which will return packet in character stream. The checksum value can be stripped from the character string. >>> p = Ether()/IP(chksum=None)/UDP()/Raw('x'*20) >>> pkt_str = p.do_build() >>> hexstr(pkt_str[24]) '7c |' >>> hexstr(pkt_str[25]) 'ba .' >>> > -----Original Message----- > From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Liu, Yong > Sent: Tuesday, July 26, 2016 4:28 PM > To: Mo, YufengX; dts@dpdk.org > Cc: Mo, YufengX > Subject: Re: [dts] [PATCH V2 2/2] Ipgre: upload automation testing script > > Thanks Yufen, one question for checksum offload case. In the test plan, > checksum offload case only check whether checksum error detected by NIC. > For the checksum value, the case not checked whether it's correct. It's > different from vxlan/nvgre case, what cause the difference? > > > -----Original Message----- > > From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Yufen Mo > > Sent: Tuesday, July 26, 2016 1:45 PM > > To: dts@dpdk.org > > Cc: Mo, YufengX > > Subject: [dts] [PATCH V2 2/2] Ipgre: upload automation testing script > > > > From: yufengmx <yufengx.mo@intel.com> > > > > Generic Routing Encapsulation (GRE) is a tunneling protocol developed by > > Cisco Systems that can encapsulate > > a wide variety of network layer protocols inside virtual point-to-point > > links over an Internet Protocol network. > > Fortville support GRE packet detecting, checksum computing and filtering. > > > > Signed-off-by: yufengmx <yufengx.mo@intel.com> > > --- > > test_plans/ipgre_test_plan.rst | 181 +++++++++++++++++++++++++ > > tests/TestSuite_ipgre.py | 295 > > +++++++++++++++++++++++++++++++++++++++++ > > 2 files changed, 476 insertions(+) > > create mode 100644 test_plans/ipgre_test_plan.rst > > create mode 100644 tests/TestSuite_ipgre.py > > > > diff --git a/test_plans/ipgre_test_plan.rst > > b/test_plans/ipgre_test_plan.rst > > new file mode 100644 > > index 0000000..444efdf > > --- /dev/null > > +++ b/test_plans/ipgre_test_plan.rst > > @@ -0,0 +1,181 @@ > > +.. Copyright(c) 2010-2016 Intel Corporation > > + All rights reserved. > > + > > + Redistribution and use in source and binary forms, with or without > > + modification, are permitted provided that the following conditions > > + are met: > > + > > + - Redistributions of source code must retain the above copyright > > + notice, this list of conditions and the following disclaimer. > > + > > + - Redistributions in binary form must reproduce the above copyright > > + notice, this list of conditions and the following disclaimer in > > + the documentation and/or other materials provided with the > > + distribution. > > + > > + - Neither the name of Intel Corporation nor the names of its > > + contributors may be used to endorse or promote products derived > > + from this software without specific prior written permission. > > + > > + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS > > + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT > > + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS > > + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE > > + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, > > + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES > > + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR > > + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) > > + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, > > + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) > > + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED > > + OF THE POSSIBILITY OF SUCH DAMAGE. > > + > > + > > +==================== > > +Generic Routing Encapsulation (GRE) > > +==================== > > + > > +Generic Routing Encapsulation (GRE) is a tunneling protocol developed > by > > Cisco Systems that can encapsulate a wide variety of network layer > > protocols inside virtual point-to-point links over an Internet Protocol > > network. > > +Fortville support GRE packet detecting, checksum computing and > filtering. > > + > > +Prerequisites > > +------------- > > + > > +Fortville nic should be on the DUT. > > + > > +Test cases > > +---------- > > + > > +Test Case 1: GRE ipv4 packet detect > > +================================= > > +Start testpmd and enable rxonly forwarding mode:: > > + testpmd -c ffff -n 4 -- -i --txqflags=0x0 > > + testpmd> set fwd rxonly > > + testpmd> set verbose 1 > > + testpmd> start > > + > > +Send packet as table listed and packet type match each layer. > > + > > ++------------+----------+-----------+----------+-----------+ > > +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 | > > ++------------+----------+-----------+----------+-----------+ > > +| No | Ipv4 | GRE | Ipv4 | Udp | > > ++------------+----------+-----------+----------+-----------+ > > +| No | Ipv4 | GRE | Ipv4 | Tcp | > > ++------------+----------+-----------+----------+-----------+ > > +| No | Ipv4 | GRE | Ipv4 | Sctp | > > ++------------+----------+-----------+----------+-----------+ > > +| Yes | Ipv4 | GRE | Ipv4 | Udp | > > ++------------+----------+-----------+----------+-----------+ > > +| Yes | Ipv4 | GRE | Ipv4 | Tcp | > > ++------------+----------+-----------+----------+-----------+ > > +| Yes | Ipv4 | GRE | Ipv4 | Sctp | > > ++------------+----------+-----------+----------+-----------+ > > + > > + > > +Test Case 2: GRE ipv6 packet detect > > +================================= > > +Start testpmd and enable rxonly forwarding mode:: > > + testpmd -c ffff -n 4 -- -i --txqflags=0x0 > > + testpmd> set fwd rxonly > > + testpmd> set verbose 1 > > + testpmd> start > > + > > +Send packet as table listed and packet type match each layer. > > +Ether()/IPv6(nh=47)/GRE()/IP()/UDP()/Raw('x'*40) > > +Ether()/IPv6(nh=47)/GRE(proto=0x86dd)/IPv6()/UDP()/Raw('x'*40) > > ++------------+----------+-----------+----------+-----------+ > > +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 | > > ++------------+----------+-----------+----------+-----------+ > > +| No | Ipv6 | GRE | Ipv4 | Udp | > > ++------------+----------+-----------+----------+-----------+ > > +| No | Ipv6 | GRE | Ipv4 | Tcp | > > ++------------+----------+-----------+----------+-----------+ > > +| No | Ipv6 | GRE | Ipv4 | Sctp | > > ++------------+----------+-----------+----------+-----------+ > > +| Yes | Ipv6 | GRE | Ipv4 | Udp | > > ++------------+----------+-----------+----------+-----------+ > > +| Yes | Ipv6 | GRE | Ipv4 | Tcp | > > ++------------+----------+-----------+----------+-----------+ > > +| Yes | Ipv6 | GRE | Ipv4 | Sctp | > > ++------------+----------+-----------+----------+-----------+ > > + > > ++------------+----------+-----------+----------+-----------+ > > +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 | > > ++------------+----------+-----------+----------+-----------+ > > +| No | Ipv6 | GRE | Ipv6 | Udp | > > ++------------+----------+-----------+----------+-----------+ > > +| No | Ipv6 | GRE | Ipv6 | Tcp | > > ++------------+----------+-----------+----------+-----------+ > > +| No | Ipv6 | GRE | Ipv6 | Sctp | > > ++------------+----------+-----------+----------+-----------+ > > +| Yes | Ipv6 | GRE | Ipv6 | Udp | > > ++------------+----------+-----------+----------+-----------+ > > +| Yes | Ipv6 | GRE | Ipv6 | Tcp | > > ++------------+----------+-----------+----------+-----------+ > > +| Yes | Ipv6 | GRE | Ipv6 | Sctp | > > ++------------+----------+-----------+----------+-----------+ > > + > > +Test Case 3: GRE packet filter > > +============================ > > +Start testpmd with multi queues:: > > + testpmd -c ff -n 3 -- -i --rxq=4 --txq=4 --txqflags=0x0 > > + testpmd> set fwd rxonly > > + testpmd> set nbcore 4 > > + testpmd> set verbose 1 > > + testpmd> start > > + > > +Add GRE filter that forward inner ip address 0.0.0.0 to queue 3 > > + testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ > > + 0.0.0.0 1 ipingre iip 0 3 > > + > > +Send packet inner ip address matched and check packet recevied by queue > 3. > > + p = Ether()/IP()/GRE()/IP(dst="0.0.0.0")/UDP() > > + > > +Remove tunnel filter and check same packet recevied by queue 0 > > + testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ > > + 0.0.0.0 1 ipingre iip 0 3 > > + > > +Add GRE filter that forward outer ip address 0.0.0.0 to queue 3 > > + testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ > > + 0.0.0.0 1 ipingre oip 0 3 > > + > > +Send packet outer ip address matched and check packet recevied by queue > 3. > > + > > +Remove tunnel filter and check same packet recevied by queue 0. > > + testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \ > > + 0.0.0.0 1 ipingre iip 0 3 > > + > > +Test Case 4: GRE packet chksum offload > > +==================================== > > +Start testpmd with hardware checksum offload enabled:: > > + testpmd -c ff -n 3 -- -i --txqflags=0x0 --enable-rx-cksum --port- > > topology=loop > > + testpmd> set verbose 1 > > + testpmd> set fwd csum > > + testpmd> csum set ip hw 0 > > + testpmd> csum set udp hw 0 > > + testpmd> csum set sctp hw 0 > > + testpmd> csum set outer-ip hw 0 > > + testpmd> csum set tcp hw 0 > > + testpmd> csum parse_tunnel on 0 > > + testpmd> start > > + > > +Send packet with wrong outer IP checksum and check forwarded packet IP > > +checksum is correct. > > + Ether()/IP(chksum=0x0)/GRE()/IP()/TCP() > > + > > +Send packet with wrong inner IP checksum and check forwarded packet IP > > +checksum is correct. > > + Ether()/IP()/GRE()/IP(chksum=0x0)/TCP() > > + > > +Send packet with wrong inner TCP checksum and check forwarded packet > TCP > > +checksum is correct. > > + Ether()/IP()/GRE()/IP()/TCP(chksum=0x0) > > + > > +Send packet with wrong inner UDP checksum and check forwarded packet > UDP > > +checksum is correct. > > + Ether()/IP()/GRE()/IP()/UDP(chksum=0xffff) > > + > > +Send packet with wrong inner SCTP checksum and check forwarded packet > > SCTP > > +checksum is correct. > > + Ether()/IP()/GRE()/IP()/SCTP(chksum=0x0) > > diff --git a/tests/TestSuite_ipgre.py b/tests/TestSuite_ipgre.py > > new file mode 100644 > > index 0000000..a628f59 > > --- /dev/null > > +++ b/tests/TestSuite_ipgre.py > > @@ -0,0 +1,295 @@ > > +# BSD LICENSE > > +# > > +# Copyright(c) 2010-2014 Intel Corporation. All rights reserved. > > +# All rights reserved. > > +# > > +# Redistribution and use in source and binary forms, with or without > > +# modification, are permitted provided that the following conditions > > +# are met: > > +# > > +# * Redistributions of source code must retain the above copyright > > +# notice, this list of conditions and the following disclaimer. > > +# * Redistributions in binary form must reproduce the above copyright > > +# notice, this list of conditions and the following disclaimer in > > +# the documentation and/or other materials provided with the > > +# distribution. > > +# * Neither the name of Intel Corporation nor the names of its > > +# contributors may be used to endorse or promote products derived > > +# from this software without specific prior written permission. > > +# > > +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS > > +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT > > +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR > > +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT > > +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, > > +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT > > +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, > > +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY > > +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT > > +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE > > +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. > > + > > +""" > > +DPDK Test suite. > > + > > +Generic Routing Encapsulation (GRE) is a tunneling protocol developed > by > > +Cisco Systems that can encapsulate a wide variety of network layer > > protocols > > +inside virtual point-to-point links over an Internet Protocol network. > > + > > +Fortville support GRE packet detecting, checksum computing and > filtering. > > +""" > > + > > +import time > > +import os > > + > > +import dts > > +from test_case import TestCase > > +from exception import VerifyFailure > > +from packet import Packet > > + > > +class TestIpgre(TestCase): > > + > > + def set_up_all(self): > > + """ > > + Run at the start of each test suite. > > + """ > > + self.printFlag = dts.debug_mode > > + self.src_mac = "11:22:33:44:55:66" > > + ports = self.dut.get_ports() > > + self.verify(self.nic.startswith("fortville"), > > + "GRE tunnel packet type only support by Fortville") > > + self.verify(len(ports) >= 1, "Insufficient ports for testing") > > + valports = [_ for _ in ports if > self.tester.get_local_port(_) != > > -1] > > + # start testpmd > > + self.dut_port = valports[0] > > + tester_port = self.tester.get_local_port(self.dut_port) > > + self.tester_iface = self.tester.get_interface(tester_port) > > + self.tester_iface_mac = self.tester.get_mac(tester_port) > > + > > + def set_up(self): > > + """ > > + Run before each test case. > > + Nothing to do. > > + """ > > + pass > > + > > + def check_packet_transmission(self, pkt_types, layer_configs=None): > > + time.sleep(1) > > + for pkt_type in pkt_types.keys(): > > + pkt_names = pkt_types[pkt_type] > > + pkt = Packet(pkt_type=pkt_type) > > + if layer_configs: > > + for layer in layer_configs.keys(): > > + pkt.config_layer(layer, layer_configs[layer]) > > + pkt.send_pkt(tx_port=self.tester_iface) > > + out = self.dut.get_session_output(timeout=2) > > + if self.printFlag: # debug output > > + print out > > + for pkt_layer_name in pkt_names: > > + if self.printFlag:# debug output > > + print pkt_layer_name > > + if pkt_layer_name not in out: > > + print dts.RED("Fail to detect %s" % pkt_layer_name) > > + if not self.printFlag: > > + raise VerifyFailure("Failed to detect %s" % > > pkt_layer_name) > > + else: > > + print dts.GREEN("Detected %s successfully" % pkt_type) > > + time.sleep(1) > > + > > + def test_GRE_ipv4_packet_detect(self): > > + """ > > + Start testpmd and enable rxonly forwarding mode > > + Send packet as table listed and packet type match each layer > > + """ > > + pkt_types = { > > + "MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: UDP"], > > + "MAC_IP_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: TCP"], > > + "MAC_IP_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: SCTP"], > > + "MAC_VLAN_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: UDP"], > > + "MAC_VLAN_IP_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: TCP"], > > + "MAC_VLAN_IP_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: SCTP"] > > + } > > + config_layers = {'ether': {'src': self.src_mac}, > > + 'ipv4': {'proto': 'gre'}} > > + # Start testpmd and enable rxonly forwarding mode > > + testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx- > > cksum --enable-rx-cksum" % self.target > > + self.dut.send_expect( testpmd_cmd, > > + "testpmd>", > > + 20) > > + self.dut.send_expect("set fwd rxonly", "testpmd>") > > + self.dut.send_expect("set verbose 1", "testpmd>") > > + self.dut.send_expect("start", "testpmd>") > > + > > + self.check_packet_transmission(pkt_types, config_layers) > > + > > + self.dut.send_expect("quit", "#") > > + > > + def test_GRE_ipv6_packet_detect(self): > > + """ > > + Start testpmd and enable rxonly forwarding mode > > + Send packet as table listed and packet type match each layer > > + """ > > + pkt_types_ipv6_ip = { > > + "MAC_IPv6_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: UDP"], > > + "MAC_IPv6_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: TCP"], > > + "MAC_IPv6_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: SCTP"], > > + "MAC_VLAN_IPv6_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"], > > + "MAC_VLAN_IPv6_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"], > > + "MAC_VLAN_IPv6_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"] > > + } > > + > > + pkt_types_ipv6_ipv6 = { > > + "MAC_IPv6_GRE_IPv6_UDP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: UDP"], > > + "MAC_IPv6_GRE_IPv6_TCP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: TCP"], > > + "MAC_VLAN_IPv6_GRE_IPv6_UDP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"], > > + "MAC_VLAN_IPv6_GRE_IPv6_TCP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"] > > + } > > + > > + pkt_types_ipv6_ipv6_SCTP = { > > + "MAC_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT": ["Tunnel type: > > GRENAT", "Inner L4 type: SCTP"], > > + "MAC_VLAN_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT": ["Tunnel type: > > GRENAT", "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"] > > + } > > + > > + # Start testpmd and enable rxonly forwarding mode > > + testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx- > > cksum" % self.target > > + self.dut.send_expect(testpmd_cmd, "testpmd>", 20) > > + self.dut.send_expect("set fwd rxonly", "testpmd>") > > + self.dut.send_expect("set verbose 1", "testpmd>") > > + self.dut.send_expect("start", "testpmd>") > > + > > + # inner ipv4 > > + config_layers = {'ether': {'src': self.src_mac}, > > + 'ipv6': {'nh': 47}, > > + 'raw': {'payload':['78']*40}} > > + self.check_packet_transmission(pkt_types_ipv6_ip, config_layers) > > + > > + # inner ipv6 > > + config_layers = {'ether': {'src': self.src_mac}, > > + 'ipv6': {'nh': 47}, > > + 'gre': {'proto': 0x86dd}, > > + 'raw': {'payload':['78']*40}} > > + self.check_packet_transmission(pkt_types_ipv6_ipv6, > config_layers) > > + > > + # inner ipv6 SCTP > > + config_layers = {'ether': {'src': self.src_mac}, > > + 'ipv6': {'nh': 47}, > > + 'gre': {'proto': 0x86dd}, > > + 'inner_ipv6': {'nh': 132}, > > + 'raw': {'payload':['78']*40}} > > + self.check_packet_transmission(pkt_types_ipv6_ipv6_SCTP, > > config_layers) > > + self.dut.send_expect("quit", "#") > > + > > + def test_GRE_packet_filter(self): > > + """ > > + Start testpmd with multi queues, add GRE filter that forward > > + inner/outer ip address 0.0.0.0 to queue 3, Send packet inner > > + ip address matched and check packet recevied by queue 3 > > + """ > > + outer_mac = self.tester_iface_mac > > + inner_mac = "10:00:00:00:00:00" > > + > > + # Start testpmd with multi queues > > + testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx- > > cksum --rxq=4 --txq=4" % self.target > > + self.dut.send_expect(testpmd_cmd, "testpmd>", 20) > > + self.dut.send_expect("set fwd rxonly", "testpmd>") > > + self.dut.send_expect("set nbcore 4", "testpmd>") > > + self.dut.send_expect("set verbose 1", "testpmd>") > > + self.dut.send_expect("start", "testpmd>") > > + > > + # Add GRE filter that forward inner ip address 0.0.0.0 to queue > 3 > > + cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre iip 0 > > 3"%(outer_mac, inner_mac) > > + self.dut.send_expect( cmd, "testpmd>") > > + > > + # Send packet inner ip address matched and check packet > recevied > > by queue 3 > > + pkt_types = {"MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: UDP"]} > > + config_layers = {'ether': {'src': self.src_mac}, > > + 'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}} > > + self.check_packet_transmission(pkt_types, config_layers) > > + > > + # Remove tunnel filter and check same packet recevied by queue > 0 > > + cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0 > > 3"%(outer_mac, inner_mac) > > + self.dut.send_expect( cmd, "testpmd>") > > + > > + # Add GRE filter that forward outer ip address 0.0.0.0 to queue > 3 > > + cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre oip 0 > > 3"%(outer_mac, inner_mac) > > + self.dut.send_expect( cmd, "testpmd>") > > + > > + # Send packet outer ip address matched and check packet > recevied > > by queue 3. > > + pkt_types = {"MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", > > "Inner L4 type: UDP"]} > > + config_layers = {'ether': {'src': self.src_mac}, > > + 'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}} > > + self.check_packet_transmission(pkt_types, config_layers) > > + > > + # Add GRE filter that forward outer ip address 0.0.0.0 to queue > 3 > > + cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0 > > 3"%(outer_mac, inner_mac) > > + self.dut.send_expect( cmd, "testpmd>") > > + time.sleep(2) > > + self.dut.send_expect("quit", "#") > > + > > + def test_GRE_packet_chksum_offload(self): > > + """ > > + Start testpmd with hardware checksum offload enabled, > > + Send packet with wrong IP/TCP/UDP/SCTP checksum and check > > forwarded packet checksum > > + """ > > + # Start testpmd and enable rxonly forwarding mode > > + testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx- > > cksum --txqflags=0x0 --port-topology=loop" % self.target > > + self.dut.send_expect(testpmd_cmd, "testpmd>", 20) > > + self.dut.send_expect("set verbose 1", "testpmd>") > > + self.dut.send_expect("set fwd csum", "testpmd>") > > + self.dut.send_expect("csum set ip hw 0", "testpmd>") > > + self.dut.send_expect("csum set udp hw 0", "testpmd>") > > + self.dut.send_expect("csum set sctp hw 0", "testpmd>") > > + self.dut.send_expect("csum set outer-ip hw 0", "testpmd>") > > + self.dut.send_expect("csum set tcp hw 0", "testpmd>") > > + self.dut.send_expect("csum parse_tunnel on 0", "testpmd>") > > + self.dut.send_expect("start", "testpmd>") > > + > > + # Send packet with wrong outer IP checksum and check forwarded > > packet IP checksum is correct > > + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": > ["PKT_TX_OUTER_IP_CKSUM"]} > > + config_layers = {'ether': {'src': self.src_mac}, > > + 'ipv4': {'chksum': 0x0, 'proto': 'gre'}} > > + self.check_packet_transmission(pkt_types, config_layers) > > + > > + # Send packet with wrong inner IP checksum and check forwarded > > packet IP checksum is correct > > + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_IP_CKSUM"]} > > + config_layers = {'ether': {'src': self.src_mac}, > > + 'inner_ipv4': {'chksum': 0x0, 'proto': 'gre'}} > > + self.check_packet_transmission(pkt_types, config_layers) > > + > > + # Send packet with wrong inner TCP checksum and check forwarded > > packet TCP checksum is correct > > + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_TCP_CKSUM"]} > > + config_layers = {'ether': {'src': self.src_mac}, > > + 'tcp': {'chksum': 0x0}, > > + 'ipv4': {'proto': 'gre'}} > > + self.check_packet_transmission(pkt_types, config_layers) > > + > > + # Send packet with wrong inner UDP checksum and check forwarded > > packet UDP checksum is correct > > + pkt_types = { "MAC_IP_GRE_IP_UDP_PKT": ["PKT_TX_UDP_CKSUM"]} > > + config_layers = {'ether': {'src': self.src_mac}, > > + 'udp': {'chksum': 0xffff}, > > + 'ipv4': {'proto': 'gre'}} > > + self.check_packet_transmission(pkt_types, config_layers) > > + > > + # Send packet with wrong inner SCTP checksum and check > forwarded > > packet SCTP checksum is correct > > + pkt_types = { "MAC_IP_GRE_IP_SCTP_PKT": ["PKT_TX_SCTP_CKSUM"]} > > + config_layers = {'ether': {'src': self.src_mac}, > > + 'ipv4': {'proto': 'gre'}, > > + 'sctp': {'chksum': 0x0}} > > + self.check_packet_transmission(pkt_types , config_layers) > > + > > + self.dut.send_expect("quit", "#") > > + > > + def tear_down(self): > > + """ > > + Run after each test case. > > + Nothing to do. > > + """ > > + pass > > + > > + def tear_down_all(self): > > + """ > > + Run after each test suite. > > + Nothing to do. > > + """ > > + self.dut.kill_all() > > + pass > > -- > > 1.9.3 ^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2016-07-27 0:32 UTC | newest] Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2016-07-26 5:45 [dts] [PATCH V2 0/2] Ipgre automation testing script Yufen Mo 2016-07-26 5:45 ` [dts] [PATCH V2 1/2] add sctp/gre format support in framework/packet module Yufen Mo 2016-07-26 5:45 ` [dts] [PATCH V2 2/2] Ipgre: upload automation testing script Yufen Mo 2016-07-26 8:28 ` Liu, Yong 2016-07-27 0:32 ` Liu, Yong
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).